当前位置:网站首页>2022.7.13
2022.7.13
2022-07-27 00:48:00 【Naive witch】
I came home this day , I found myself careless . You should borrow a wave of books the day before you go home . Hurry to return the book after the exam , But I couldn't borrow a few professional books . I can only find some e-books online , Buy some more books if necessary .
read :《 Lifelong growth -116》100% I finished watching it on the train the day before yesterday , It introduces two ways of thinking , One is the fixed thinking mode , The other is the growth mode of thinking , The following example , Both advantages and disadvantages revolve around these two modes of thinking .
What we see today :《 meditations 》46 page
English :

Programming : Learned about git The concept of , Basic use . Just listen to history , The version is a little dizzy .GIT It is a tool for managing files . Mainly familiar with it in Android Operation process . Relevant concepts : Repository Warehouse Clone clone Checkout Check out the Commit Submit Branch Branch Merge Merge Push push Pull Pull
About git Its official website :Git - Book (git-scm.com)
边栏推荐
- 【4.9 容斥原理详解】
- Comparative simulation of LEACH protocol performance, including the number of dead nodes, data transmission, network energy consumption, the number of cluster heads and load balance
- [interview: concurrent Article 16: multithreading: detailed explanation of wait/notify] principle and wrong usage (false wake-up, etc.)
- Two or three things about redis
- Detailed explanation of arrow function 2021-04-30
- Dynamic binding, static binding, and polymorphism
- [3. VIM operation]
- 公司给了IP地址如何使用(详细版)
- Use of postman
- The use of C language static can flexibly change the life cycle and make you write code like a duck to water
猜你喜欢

Matlab simulation of image reconstruction using filtered back projection method

3_ Jupiter notebook, numpy and mattlotlib

并行MPI程序传递发送消息
![[acwing game 61]](/img/83/c9a43536705451a60252720fc41d14.jpg)
[acwing game 61]
![[Network Research Institute] attackers scan 1.6 million WordPress websites to find vulnerable plug-ins](/img/91/4d6e7d46599a67e3d7c73afb375abd.png)
[Network Research Institute] attackers scan 1.6 million WordPress websites to find vulnerable plug-ins

DOM day_ 01 (7.7) introduction and core operation of DOM

On the expression of thymeleaf

Detailed explanation of CSRF forged user request attack

Two or three things about redis

运算符重载
随机推荐
Elaborate on the differences and usage of call, apply and bind 20211031
[Network Research Institute] attackers scan 1.6 million WordPress websites to find vulnerable plug-ins
Friend友元函数以及单例模式
[HarekazeCTF2019]encode_and_encode
【Codeforces Round #808 (Div 2.) A·B·C】
[qt] solve the problem of Chinese garbled code
Two methods of automated testing XSS vulnerabilities using burpsuite
SSRF explanation and burp automatic detection SSRF
DOM day_02(7.8)网页制作流程、图片src属性、轮播图、自定义属性、标签栏、输入框事件、勾选操作、访问器语法
Openharmony quick start
TypeScript(tsconfig.json)
【4.1 质数及线性筛】
蓝桥杯 1004 [递归]母牛的故事
CDs simulation of minimum dominating set based on MATLAB
Yolo of Darknet_ Forward of layer_ yolo_ Layer comments
js中this指向详解
C language is more than a variety of descriptions of size. Don't stick to one way of writing
The detailed process of reinstalling AutoCAD after uninstallation and deleting the registry
[acwing game 61]
【4.3 欧拉函数详解】